Jump to content

post_break

Active Members
  • Posts

    41
  • Joined

  • Last visited

Contact Methods

  • AIM
    herzeleid435
  • Website URL
    http://iamthekiller.net
  • ICQ
    0
  • Yahoo
    herzeleid435

Recent Profile Visitors

1,558 profile views

post_break's Achievements

Newbie

Newbie (1/14)

  1. That would work perfectly if this installation wasn't going inside a van :-P. I'll definitely save the link for later though. Thanks for the link.
  2. The plan is for my company to offer a rolling hotspot in our van. We have a Clear iSpot which is hacked to allow anyone access. We want to force people to view our website when they first connect. So as soon as they get an IP and try to load a webpage they are redirected to our site, where we have our TOS (don't abuse this wifi, ect). Once they view this page they will be free to go where ever they want. The iSpot is running what I believe to be an embedded linux build with IP tables. Is there a way to set a temporary, one-time-use redirect like I'm describing? I have telnet access to the device and once this patch is added I'd need help on securing that as well.
  3. I wouldn't try to do arp poisoning at work if you're not working in IT. I take that back, I wouldn't do it period. That type of stuff can come back and bite you in the ass. Source fire will definitely know what's up depending on what your company does.
  4. After a night burn in it has stopped for the time being. The fon hadnt been turned on since 2006 when it left the factory so maybe thats why it was flakey.
  5. So I have OpenWRT on the fon but it drops wifi every 5-10 minutes, constantly. Anyone else experiencing this? I have it setup using WPA2 PSK. The fon has a huge 8DBI antenna and still drops the connection. I have tried this with the regular antenna as well. Here is a log of what is happening. Jan 1 00:05:28 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: associated Jan 1 00:05:28 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: pairwise key handshake completed (RSN) Jan 1 00:12:39 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: associated Jan 1 00:12:39 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: pairwise key handshake completed (RSN) Jan 1 00:14:11 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: deauthenticated due to local deauth request Jan 1 00:14:11 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: disassociated Jan 1 00:14:14 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: associated Jan 1 00:14:14 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: pairwise key handshake completed (RSN) Jan 1 00:18:55 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: associated Jan 1 00:18:55 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: pairwise key handshake completed (RSN) Jan 1 00:24:08 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: group key handshake completed (RSN) Jan 1 00:34:11 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: deauthenticated due to local deauth request Jan 1 00:34:11 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: disassociated Jan 1 00:34:25 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: associated Jan 1 00:34:25 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: pairwise key handshake completed (RSN) Jan 1 00:37:35 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: associated Jan 1 00:37:35 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: pairwise key handshake completed (RSN) Jan 1 00:43:57 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: associated Jan 1 00:43:57 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: pairwise key handshake completed (RSN) Jan 1 00:44:08 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: group key handshake completed (RSN) Jan 1 00:52:11 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: associated Jan 1 00:52:11 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: pairwise key handshake completed (RSN) Jan 1 00:54:08 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e WPA: group key handshake completed (RSN) Jan 1 00:57:31 (none) daemon.info hostapd: ath0: STA 00:17:f2:99:56:3e IEEE 802.11: disassociated
  6. I have been looking for a way to fix the wireless LED in openwrt, has anyone found a fix? Mine doesnt come up at all and for right now I just want to play with OpenWRT and not Jasager.
  7. The same thing that Jasager does basically. Creates an AP that accepts all probes. It uses dual wireless NICS in tandem to achieve the exploit on the go or you can just use one.
  8. I have used the equivalent of Jasager (airbase) out in the public and I can say it is lethal. I waited about 60 seconds after starting the AP for someone to join and start surfing facebook. I'm getting my FON tomorrow so I'll let you know how it is in the field. Hopefully I can get it to log data just like I can do with airbase.
  9. http://reduxcomputing.com/proximity.php About the best I can come up with.
  10. Im trying to do the same thing with these guys. It's pretty complicated and being on a Mac doesnt help. Your idea looks compelling however it's not cross platform. I am taking a look at this guy. http://www.j4mie.org/2008/02/15/how-to-mak...gmail-notifier/
  11. We had a guy like you on the plant. You can easily see which node you're coming from and then trace it down from there, no need to go door to door. If you're on the network we know you're there. Its not a matter of if we can see you. It's like DHCP, if you connect to the LDAP server, get an IP address, register the MAC, then we clearly know who you are, you cant spoof existence. Depending on who your little buddy is you will get caught. If he is in the core IP group he could set your MAC up to be a test unit so it doesnt show up in the billing department. This would land him in a world of hurt if he gets caught doing so. I highly doubt that scenario however.
  12. Let me guess, you cloned the MAC of another cable modem. Chances are they see you but wont do anything until they get the info to their lawyers.
  13. You guys need to understand that bit torrent can be tracked extremely easily on the ISPs end. Having played with the tools they use (Sandvine, Snort or Sourcefire) you cannot hide even with your encryption settings. One of the few ways to stay hidden is to use Usenet over an SSL. Don't get me started about how expensive it is but I would rather pay a monthly amount than go to pound you in the ass prison all because I want to watch a TV show in high def. The SSL is not completely secure as well, I've seen some of the tools that decrypt that information however they cannot pursue you considering that is not exactly legal, yet.
  14. Yeah the broadcom in my macbook has almost no support in linux besides ndiswrapper and that is very flakey. I wish they would open up drivers for linux.
×
×
  • Create New...